Use applied math to map fire stations, develop facial recognition software, solve the art gallery problem and more in this hands-on, real-world infosec book.
Explore the intersection of mathematics and computer security with this engaging and accessible guide.
Math for Security will equip you with essential tools to tackle complex security problems head on. All you need are some basic programming skills. Once you’ve set up your development environment and reviewed the necessary Python syntax and math notation in the early chapters, you’ll dive deep into practical applications, leveraging the power of math to analyze networks, optimize resource distribution, and much more. In the book’s final chapters, you’ll take your projects from proof of concepts to viable applications and explore options for delivering them to end users.
As you work through various security scenarios, you’ll:
"synopsis" may belong to another edition of this title.
Daniel Reilly is a security researcher, analyst, and consultant based out of Seattle, WA. He has worked in the security field for 20 years, more than half of which has been spent developing and managing operational security for small businesses.
"About this title" may belong to another edition of this title.
US$ 3.75 shipping within U.S.A.
Destination, rates & speedsSeller: HPB-Red, Dallas, TX, U.S.A.
paperback. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Seller Inventory # S_431354083
Quantity: 1 available
Seller: SecondSale, Montgomery, IL, U.S.A.
Condition: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Seller Inventory # 00087075835
Quantity: 1 available
Seller: Bellwetherbooks, McKeesport, PA, U.S.A.
paperback. Condition: Very Good. Very Good Condition - May show some limited signs of wear and may have a remainder mark. Pages and dust cover are intact and not marred by notes or highlighting. Seller Inventory # NS-PB-VG-1718502567
Quantity: 2 available
Seller: BooksRun, Philadelphia, PA, U.S.A.
Paperback. Condition: Very Good. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. Seller Inventory # 1718502567-8-1
Quantity: 1 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 44699514-n
Quantity: 3 available
Seller: INDOO, Avenel, NJ, U.S.A.
Condition: New. Seller Inventory # 9781718502567
Quantity: Over 20 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 44699514
Quantity: 3 available
Seller: INDOO, Avenel, NJ, U.S.A.
Condition: As New. Unread copy in mint condition. Seller Inventory # RH9781718502567
Quantity: Over 20 available
Seller: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condition: New. New Book. Shipped from UK. Established seller since 2000. Seller Inventory # DB-9781718502567
Quantity: 2 available
Seller: Grand Eagle Retail, Fairfield, OH, U.S.A.
Paperback. Condition: new. Paperback. Use applied math to map fire stations, develop facial recognition software, solve the art gallery problem and more in this hands-on, real-world infosec book.Use applied math to map fire stations, develop facial recognition software, solve the art gallery problem and more in this hands-on, real-world infosec book.Explore the intersection of mathematics and computer security with this engaging and accessible guide.Math for Security will equip you with essential tools to tackle complex security problems head on. All you need are some basic programming skills. Once you've set up your development environment and reviewed the necessary Python syntax and math notation in the early chapters, you'll dive deep into practical applications, leveraging the power of math to analyze networks, optimize resource distribution, and much more. In the book's final chapters, you'll take your projects from proof of concepts to viable applications and explore options for delivering them to end users.As you work through various security scenarios, you'll-Employ packet analysis and graph theory to detect data exfiltration attempts in a networkPredict potential targets and find weaknesses in social networks with Monte Carlo simulationsUse basic geometry and OpenCell data to triangulate a phone's location without GPSApply computational geometry to Voronoi diagrams for use in emergency service planningTrain a facial recognition system with machine learning for real-time identity verificationUse spatial analysis to distribute physical security features effectively in an art galleryWhether you're an aspiring security professional, a social network analyst, or an innovator seeking to create cutting-edge security solutions, this book will empower you to solve complex problems with precision and confidence. Embrace the intricate world of math as your secret weapon in computer security!Covers Python 3.x "A math-based guide for information security practitioners. Teaches how to use concepts from various fields of mathematics, such as graph theory, computational geometry, and statistics, to create and implement ready-to-use security tools. Features code examples in Python and hands-on proof-of-concept projects for solving real-world problems"-- Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Seller Inventory # 9781718502567
Quantity: 1 available